2024

The Invisible Polyjuice Potion: an Effective Physical Adversarial Attack against Face Recognition
The Invisible Polyjuice Potion: an Effective Physical Adversarial Attack against Face Recognition

Ye Wang, Zeyan Liu, Bo Luo, Rongqing Hui, Fengjun Li

Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security (CCS) 2024

In this paper, we propose a novel physical adversarial attack against deep face recognition systems, namely Agile (Adversarial Glasses with Infrared LasEr). It generates adjustable, invisible laser perturbations and emits them into the camera CMOS to launch dodging and impersonation attacks against facial biometrics systems.

The Invisible Polyjuice Potion: an Effective Physical Adversarial Attack against Face Recognition

Ye Wang, Zeyan Liu, Bo Luo, Rongqing Hui, Fengjun Li

Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security (CCS) 2024

In this paper, we propose a novel physical adversarial attack against deep face recognition systems, namely Agile (Adversarial Glasses with Infrared LasEr). It generates adjustable, invisible laser perturbations and emits them into the camera CMOS to launch dodging and impersonation attacks against facial biometrics systems.

2023

Poster: Ethics of Computer Security and Privacy Research Current Status and Trends from a Data Perspective
Poster: Ethics of Computer Security and Privacy Research Current Status and Trends from a Data Perspective

Kevin Li, Zhaohui Wang, Ye Wang, Bo Luo, Fengjun Li

Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security 2023

Ethics is an important criterion for security research. This work presents the current status and trends that security researchers have taken to address ethical concerns in their studies from a data perspective.

Poster: Ethics of Computer Security and Privacy Research Current Status and Trends from a Data Perspective

Kevin Li, Zhaohui Wang, Ye Wang, Bo Luo, Fengjun Li

Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security 2023

Ethics is an important criterion for security research. This work presents the current status and trends that security researchers have taken to address ethical concerns in their studies from a data perspective.

2015

A Near Field Communication(NFC) Security Model Based on OSI Reference Model
A Near Field Communication(NFC) Security Model Based on OSI Reference Model

Wei Fan, Weiqing Huang, Zhujun Zhang, Ye Wang, Degang Sun

2015 IEEE Trustcom/BigDataSE/ISPA 2015

This paper sets up an NFC security model based on the OSI model. Security risk and countermeasure of each layer of the security model are described as the foundation of the former works. Evaluation methods are proposed to assess the security model, and the results show a high protection level.

A Near Field Communication(NFC) Security Model Based on OSI Reference Model

Wei Fan, Weiqing Huang, Zhujun Zhang, Ye Wang, Degang Sun

2015 IEEE Trustcom/BigDataSE/ISPA 2015

This paper sets up an NFC security model based on the OSI model. Security risk and countermeasure of each layer of the security model are described as the foundation of the former works. Evaluation methods are proposed to assess the security model, and the results show a high protection level.